Wireless communications systems security. Alexey Fomin, SUAI fomin@vu.spb.ru



Similar documents
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.

CS 356 Lecture 29 Wireless Security. Spring 2013

Chapter 6 CDMA/802.11i

MAC Layer Key Hierarchies and Establishment Procedures

Authentication in WLAN

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

chap18.wireless Network Security

WLAN w Technology

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Hole196 Vulnerability in WPA2

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Wireless Pre-Shared Key Cracking (WPA, WPA2)

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

How To Understand The Latest Wireless Networking Technology

Wireless security. Any station within range of the RF receives data Two security mechanism

Security Sensor Network. Biswajit panja

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

WIRELESS LAN SECURITY FUNDAMENTALS

Agenda. What is Hybrid AP Fat AP vs. Thin AP Benefits of ZyXEL Hybrid AP How Managed AP finds the Controller AP Web GUI

SPINS: Security Protocols for Sensor Networks

IEEE Wireless LAN Security Overview

How To Secure Wireless Networks

Security Policy. Trapeze Networks

IT-Sicherheit: Sicherheitsprotokolle. Wireless Security. (unter Benutzung von Material von Brian Lee und Takehiro Takahashi)

IEEE 802.1X For Wireless LANs

Chapter 2 Wireless Networking Basics

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

Wi-Fi in Healthcare:

Network security, TKK, Nov

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Midterm. Name: Andrew user id:

MSC-131. Design and Deploy AirDefense Solutions Exam.

With its promise of a target transmission. Responding to Security Issues in WiMAX Networks. Section Title

Wireless Network Security Spring 2014

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Research In Motion D. Stanley, Ed. Aruba Networks March 2009

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

Wi-Fi Alliance Voice-Enterprise Certification: Standardized Fast Secure Roaming. Whitepaper

ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS NETWORKS

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

BatCave: Adding Security to the BATMAN Protocol

IEEE i WLAN Security Protocol A Software Engineer s Model

Chapter 10: Designing and Implementing Security for Wireless LANs Overview

Secure Unicast Position-based Routing Protocols for Ad-Hoc Networks

Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak

Whitepaper. Author: Jerome Henry. Editor: Marcus Burton. November 2011 Version 1.00

Recommended Wireless Local Area Network Architecture

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

WiFi Security: WEP, WPA, and WPA2

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

WiFi Security Assessments

Certified Wireless Security Professional (CWSP) Course Overview

NXC5500/2500. Application Note. Smart Classroom Load Balancing. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Network Security Protocols

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Wireless LAN Services for Hot-Spot

Wireless LAN Pen-Testing. Part I

Public Key Infrastructure

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Introduction to Network Security Key Management and Distribution

EETS 8316 Wireless Networks Fall 2013

LIST OF FIGURES. Figure No. Caption Page No.

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Implementing Security for Wireless Networks

Understanding Digital Certificates and Secure Sockets Layer (SSL)

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz

Outline : Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture

Cryptography and Network Security Chapter 14

Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey

Wireless Security: Secure and Public Networks Kory Kirk

Bit Chat: A Peer-to-Peer Instant Messenger

Whitenoise Security as a Service

Preventing Unauthorized Messages and Achieving End-to-End Security in Delay Tolerant Heterogeneous Wireless Networks

EAP-WAI Authentication Protocol

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Tema 5.- Seguridad. Problemas Soluciones

Lecture 2 Secure Wireless LAN

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Wireless Mesh Networks under FreeBSD

Security in IEEE WLANs

Authentication Applications

Introduction to Cryptography

Transcription:

Wireless communications systems security Alexey Fomin, SUAI fomin@vu.spb.ru

Agenda Current security solutions in wireless systems (802.11) Open problems 2

Security Tasks Message authentication & privacy Node\Base Station mutual Authentication Key Management 3

Message Protection Message Protection Encryption (E(*)) (provides Privacy) Packet Number (PN) (provides Freshness) Message Integrity Code (MIC) (provides Authentication) Key hierarchy PMK = pair-wise master key PTK = pair-wise transient key (unicast traffic protection) GTK = group temporal key (broadcast traffic protection) 4

Key Management PMK Administrator provides STA and AP with PSK Only STA and AP are involved Administrator provides STA with key for AS (authentication server) EAP-TLS, EAP-PSK, Obtaining PMK in a distributed way by using AS (802.1X) 1. Request to AS 2. PMK STA AP 3. PMK AS 5

Obtaining PTK and GTK BSS mode PTK GTK 4-Way Handshake STA 1 STA 2 IBSS mode 4-Way Handshake GTK 6

Open Problems Authentication of broadcast frames Authentication of management frames Key management in ad-hoc (IBSS) networks 7

Broadcast Frames Authentication AP distributes GTK to all STAs during association process Broadcast data frames are protected by using of GTK Nodes can not identify real source of the broadcast frame Any STA could send broadcast data frames acting as AP 8

Possible Solutions Public Key Signature Computational overhead is too big MICs on pair-wise keys Network overhead is too big One/multi time signature Network overhead is too big TESLA Delayed authentication 9

TESLA Generation Usage K 0 =h(k 1 ) K n-2 =h(k n-1 ) K 3 K 1 K 2 K n-1 =h(k n ) K n K j-1 =H(K j ) K 0 verification key Broadcast source sends t for all messages during period j M M j K j 1 MIC(K j, j K j 1 M) Broadcast destinations Cache all the frames received during period j Verify that K j 2 =H(K j-1 ) Use K j 1 to validate the MICs of all frames received during the previous period j 1 Disadvantages: Delayed authentication, Time synchronization 10

Management Frames Mgmt frames are more important for functioning of the network Stronger protection should be used Broadcast Protection Issues Beacon Protection Deauthentication/deassociation Protection 11

Beacon Protection Problem Statement Beacon should be received by STA before authentication/association, i.e. before keys are available Possible solution Accept several initial beacons without authentication After authentication/association use TESLA 12

Beacon Protection Beacon is authenticated using TESLA TESLA requires time synchronization Time synchronization is provided in beacon Chicken and Egg problem 13

Deauthentication Protection DoS attack Disassociation or Deauthentication broadcast Associated Group (same GTK) Need to protect management frames that a Access Point uses to disassociate or deauthenticate. Otherwise attacker can forge such frames which results in a DoS attack. 14

Possible Solution AP distributes the commitment value CV = hash(cgtk) to STAs When AP sends broadcast Disassociation/Deauthenticate, it disclosures CGTK When an STA receives a protected broadcast, it accepts frame only if CV = hash(cgtk) This broadcast frame was successfully protected, because it is sent only once per session. One-time signature 15

Public Key Infrastructure (PKI) Binding between PK and user User certificate (CERT) CERT=<Name, Tstart, Tend, PK, CA Signature> Certificate management Issuing, renewal, revocation Done by trusted third party Certificate Authority (CA) 16

Key Management Centralized certification authority (CA), which provides STAs with certificates, exists in scenarios discussed previously There are scenarios (e.g. MANET), where such authority is not available (no fixed infrastructure) To use certificate in self-organized networks we need to distribute the functionality of CA Distribute signing procedure 17

Distributed Certification Authority Distributed signing procedure => distributed secret key Secret Sharing (t,n)-scheme SK CA is shared among all n nodes t<n nodes can make calculation with SK CA Less than t nodes can not 18

Thank You 19